Book Image

Mastering VMware Horizon 7.8 - Third Edition

By : Peter von Oven, Barry Coombs
Book Image

Mastering VMware Horizon 7.8 - Third Edition

By: Peter von Oven, Barry Coombs

Overview of this book

Desktop virtualization can be tough, but VMware Horizon 7.8 changes all that. With a rich and adaptive UX, improved security,and a range of useful features for storage and networking optimization, there's plenty to love. But to properly fall in love with it, you need to know how to use it, and that means venturing deeper into the software and taking advantage of its extensive range of features, many of which are underused and underpromoted. This guide will take you through everything you need to know to not only successfully virtualize your desktop infrastructure, but also to maintain and optimize it to keep all your users happy. We'll show you how to assess and analyze your infrastructure, and how to use that analysis to design a solution that meets your organizational and user needs. Once you've done that, you'll find out how to build your virtualized environment, before deploying your virtualized solution. But more than that,we'll also make sure you know everything you need to know about the full range of features on offer, including the mobile cloud, so that you can use them to take full control of your virtualized infrastructure.
Table of Contents (21 chapters)
Free Chapter
1
Section 1: Installation and Configuration
7
Section 2: Building and Delivering the Virtual Desktop Experience
13
Section 3: Advanced Features, Troubleshooting, and Upgrading an Environment

Installing a Security Server

The next component that we are going to install is the Security Server so that you can allow external access to your end users.

The Security Server is another instance of the Connection Server and is going to be installed on the virtual machine with the hostname hzn7-sec.pvolab.com. This was built in the previous chapter. It will also need a static IP address assigned to it, but this should not be joined to the domain.

Don't forget that a Security Server has a one-to-one relationship with a Connection Server. If you wish to roll out a number of Security Servers, you will want to have multiple View Connection Servers.

It is also recommended that you have dedicated external View Connection Servers ready to pair with your Security Servers and separate View Connection Servers for internal connections. This will allow you to specify which users can...